--- /dev/null
+/*
+ * Copyright (c) 2002-2004,2011-2014 Apple Inc. All Rights Reserved.
+ *
+ * @APPLE_LICENSE_HEADER_START@
+ *
+ * This file contains Original Code and/or Modifications of Original Code
+ * as defined in and that are subject to the Apple Public Source License
+ * Version 2.0 (the 'License'). You may not use this file except in
+ * compliance with the License. Please obtain a copy of the License at
+ * http://www.opensource.apple.com/apsl/ and read it before using this
+ * file.
+ *
+ * The Original Code and all software distributed under the License are
+ * distributed on an 'AS IS' basis, WITHOUT WARRANTY OF ANY KIND, EITHER
+ * EXPRESS OR IMPLIED, AND APPLE HEREBY DISCLAIMS ALL SUCH WARRANTIES,
+ * INCLUDING WITHOUT LIMITATION, ANY WARRANTIES OF MERCHANTABILITY,
+ * FITNESS FOR A PARTICULAR PURPOSE, QUIET ENJOYMENT OR NON-INFRINGEMENT.
+ * Please see the License for the specific language governing rights and
+ * limitations under the License.
+ *
+ * @APPLE_LICENSE_HEADER_END@
+ */
+
+//
+// TrustStore.h - Abstract interface to permanent user trust assignments
+//
+#include <security_keychain/TrustStore.h>
+#include <security_keychain/Globals.h>
+#include <security_keychain/Certificate.h>
+#include <security_keychain/KCCursor.h>
+#include <security_keychain/SecCFTypes.h>
+#include <security_cdsa_utilities/Schema.h>
+#include <security_keychain/SecTrustSettingsPriv.h>
+
+namespace Security {
+namespace KeychainCore {
+
+
+//
+// Make and break: trivial
+//
+TrustStore::TrustStore(Allocator &alloc)
+ : allocator(alloc), mRootsValid(false), mRootBytes(allocator), mMutex(Mutex::recursive)
+{
+}
+
+TrustStore::~TrustStore()
+{ }
+
+//
+// Retrieve the trust setting for a (certificate, policy) pair.
+//
+SecTrustUserSetting TrustStore::find(Certificate *cert, Policy *policy,
+ StorageManager::KeychainList &keychainList)
+{
+ StLock<Mutex> _(mMutex);
+
+ if (Item item = findItem(cert, policy, keychainList)) {
+ // Make sure that the certificate is available in some keychain,
+ // to provide a basis for editing the trust setting that we're returning.
+ if (cert->keychain() == NULL) {
+ if (cert->findInKeychain(keychainList) == NULL) {
+ Keychain defaultKeychain = Keychain::optional(NULL);
+ if (Keychain location = item->keychain()) {
+ try {
+ cert->copyTo(location); // add cert to the trust item's keychain
+ } catch (...) {
+ secdebug("trusteval", "failed to add certificate %p to keychain \"%s\"",
+ cert, location->name());
+ try {
+ if (&*location != &*defaultKeychain)
+ cert->copyTo(defaultKeychain); // try the default (if it's not the same)
+ } catch (...) {
+ // unable to add the certificate
+ secdebug("trusteval", "failed to add certificate %p to keychain \"%s\"",
+ cert, defaultKeychain->name());
+ }
+ }
+ }
+ }
+ }
+ CssmDataContainer data;
+ item->getData(data);
+ if (data.length() != sizeof(TrustData))
+ MacOSError::throwMe(errSecInvalidTrustSetting);
+ TrustData &trust = *data.interpretedAs<TrustData>();
+ if (trust.version != UserTrustItem::currentVersion)
+ MacOSError::throwMe(errSecInvalidTrustSetting);
+ return trust.trust;
+ } else {
+ return kSecTrustResultUnspecified;
+ }
+}
+
+
+//
+// Set an individual trust element
+//
+void TrustStore::assign(Certificate *cert, Policy *policy, SecTrustUserSetting trust)
+{
+ StLock<Mutex> _(mMutex);
+
+ TrustData trustData = { UserTrustItem::currentVersion, trust };
+ Keychain defaultKeychain = Keychain::optional(NULL);
+ Keychain trustLocation = defaultKeychain; // default keychain, unless trust entry found
+ StorageManager::KeychainList searchList;
+ globals().storageManager.getSearchList(searchList);
+
+ if (Item item = findItem(cert, policy, searchList)) {
+ // user has a trust setting in a keychain - modify that
+ trustLocation = item->keychain();
+ if (trust == kSecTrustResultUnspecified)
+ item->keychain()->deleteItem(item);
+ else
+ item->modifyContent(NULL, sizeof(trustData), &trustData);
+ } else {
+ // no trust entry: make one
+ if (trust != kSecTrustResultUnspecified) {
+ Item item = new UserTrustItem(cert, policy, trustData);
+ if (Keychain location = cert->keychain()) {
+ try {
+ location->add(item); // try the cert's keychain first
+ trustLocation = location;
+ } catch (...) {
+ if (&*location != &*defaultKeychain)
+ defaultKeychain->add(item); // try the default (if it's not the same)
+ }
+ } else {
+ defaultKeychain->add(item); // raw cert - use default keychain
+ }
+ }
+ }
+
+ // Make sure that the certificate is available in some keychain,
+ // to provide a basis for editing the trust setting that we're assigning.
+ if (cert->keychain() == NULL) {
+ if (cert->findInKeychain(searchList) == NULL) {
+ try {
+ cert->copyTo(trustLocation); // add cert to the trust item's keychain
+ } catch (...) {
+ secdebug("trusteval", "failed to add certificate %p to keychain \"%s\"",
+ cert, trustLocation->name());
+ try {
+ if (&*trustLocation != &*defaultKeychain)
+ cert->copyTo(defaultKeychain); // try the default (if it's not the same)
+ } catch (...) {
+ // unable to add the certificate
+ secdebug("trusteval", "failed to add certificate %p to keychain \"%s\"",
+ cert, defaultKeychain->name());
+ }
+ }
+ }
+ }
+}
+
+
+//
+// Search the user's configured keychains for a trust setting.
+// If found, return it (as a TrustItem). Otherwise, return NULL.
+// Note that this function throws if a "real" error is encountered.
+//
+Item TrustStore::findItem(Certificate *cert, Policy *policy,
+ StorageManager::KeychainList &keychainList)
+{
+ // As of OS X 10.5, user trust records are no longer stored in keychains.
+ // SecTrustSetUserTrust was replaced with SecTrustSettingsSetTrustSettings,
+ // which stores per-user trust in a separate root-owned file. This method,
+ // however, would continue to find old trust records created prior to 10.5.
+ // Since those are increasingly unlikely to exist (and cannot be edited),
+ // we no longer need or want to look for them anymore.
+ return ((ItemImpl*)NULL);
+
+ StLock<Mutex> _(mMutex);
+
+ try {
+ SecKeychainAttribute attrs[2];
+ CssmAutoData certIndex(Allocator::standard());
+ UserTrustItem::makeCertIndex(cert, certIndex);
+ attrs[0].tag = kSecTrustCertAttr;
+ attrs[0].length = (UInt32)certIndex.length();
+ attrs[0].data = certIndex.data();
+ const CssmOid &policyOid = policy->oid();
+ attrs[1].tag = kSecTrustPolicyAttr;
+ attrs[1].length = (UInt32)policyOid.length();
+ attrs[1].data = policyOid.data();
+ SecKeychainAttributeList attrList = { 2, attrs };
+ KCCursor cursor(keychainList, CSSM_DL_DB_RECORD_USER_TRUST, &attrList);
+ Item item;
+ if (cursor->next(item))
+ return item;
+ }
+ catch (const CommonError &error) {}
+
+ return ((ItemImpl*)NULL); // no trust schema, no records, no error
+}
+
+void TrustStore::getCssmRootCertificates(CertGroup &rootCerts)
+{
+ StLock<Mutex> _(mMutex);
+
+ if (!mRootsValid)
+ loadRootCertificates();
+ rootCerts = CertGroup(CSSM_CERT_X_509v3, CSSM_CERT_ENCODING_BER, CSSM_CERTGROUP_DATA);
+ rootCerts.blobCerts() = &mRoots[0];
+ rootCerts.count() = (uint32)mRoots.size();
+}
+
+//
+// Load root (anchor) certificates from disk
+//
+void TrustStore::loadRootCertificates()
+{
+ StLock<Mutex> _(mMutex);
+
+ CFRef<CFArrayRef> anchors;
+ OSStatus ortn;
+
+ /*
+ * Get the current set of all positively trusted anchors.
+ */
+ ortn = SecTrustSettingsCopyUnrestrictedRoots(
+ true, true, true, /* all domains */
+ anchors.take());
+ if(ortn) {
+ MacOSError::throwMe(ortn);
+ }
+
+ // how many data bytes do we need?
+ size_t size = 0;
+ CFIndex numCerts = CFArrayGetCount(anchors);
+ CSSM_RETURN crtn;
+ for(CFIndex dex=0; dex<numCerts; dex++) {
+ SecCertificateRef certRef = (SecCertificateRef)CFArrayGetValueAtIndex(anchors, dex);
+ CSSM_DATA certData;
+ crtn = SecCertificateGetData(certRef, &certData);
+ if(crtn) {
+ CssmError::throwMe(crtn);
+ }
+ size += certData.Length;
+ }
+ mRootBytes.length(size);
+
+ // fill CssmData vector while copying data bytes together
+ mRoots.clear();
+ uint8 *base = mRootBytes.data<uint8>();
+ for(CFIndex dex=0; dex<numCerts; dex++) {
+ SecCertificateRef certRef = (SecCertificateRef)CFArrayGetValueAtIndex(anchors, dex);
+ CSSM_DATA certData;
+ SecCertificateGetData(certRef, &certData);
+ memcpy(base, certData.Data, certData.Length);
+ mRoots.push_back(CssmData(base, certData.Length));
+ base += certData.Length;
+ }
+
+ secdebug("anchors", "%ld anchors loaded", (long)numCerts);
+
+ mRootsValid = true; // ready to roll
+}
+
+} // end namespace KeychainCore
+} // end namespace Security